This paper explores what motivates password manager (PM) users in the US to switch from one PM to another, the techniques they employ when switching, and challenges they …
Robust password management is crucial for users' information security. The use of password manager technology, which constitutes adaptive coping, is the dominant method …
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought new challenges for usable authentication. Compared to regular web services, the nature of …
R Paudel, MN Al-Ameen - International Journal of Human …, 2025 - Taylor & Francis
There is a dearth in existing literature to attain systematic understanding of leveraging digital storytelling in security designs. As we begin to address this gap, we focused on user …
Password managers (PMs) have been widely recommended to users to generate and store random, secure, and unique passwords across websites. Using a PM is often not enough …
Protecting a wide range of online account credentials has become a critical challenge for individuals and businesses in the current digital world. Traditional password-handling …
D Bassett, N Micallef, B Müller - Annual conference on Advances in Cyber …, 2024 - Springer
Passwords are still a popular authentication approach, even as biometric authentication has become a widespread method to access our phones. Although password managing tools …
Credential audit interfaces in password managers play a crucial role in enhancing user security by identifying weak, reused, or exposed passwords. However, existing research …
Information technology has become more and more ubiquitous in recent times, and it affects almost all aspects of modern life. To protect this technology and its underlying resources, the …